Browse Definitions :

Browse Definitions by Alphabet

CUS - CYB

  • customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
  • customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
  • customer analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
  • customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
  • customer communications management (CCM) - Customer communications management (CCM) is the administration of outbound communications to customers that includes the creation, delivery and storage of all types of communications.
  • customer data analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer data integration - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
  • customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
  • Customer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
  • customer edge router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
  • customer engagement - Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness.
  • customer experience (CX) - Customer experience (CX) is the sum total of customers’ perceptions and feelings resulting from interactions with a brand’s products and services.
  • customer experience (CX) automation - Customer experience (CX) automation is any technology that assists customers with common tasks, sometimes replacing the involvement of humans, to improve customer interactions.
  • customer experience management (CEM or CXM) - Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization throughout the customer lifecycle.
  • customer feedback loop - A feedback loop, in customer relationship management (CRM), is a strategy for gathering information about a buyer’s perception of a product or service in order to determine future actions.
  • customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or cross-selling or up-selling strategies.
  • Customer Information Control System - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • customer intelligence - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer intelligence (CI) - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer journey map - A customer journey map is a diagram or several diagrams that depict the stages customers go through when interacting with a company, from buying products online to accessing customer service on the phone to airing grievances on social media.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer lifetime value (CLV) - The customer lifetime value (CLV) is a metric that represents a customer's monetary worth to an organization.
  • customer loyalty - Customer loyalty is an adherence between a customer and a brand that causes the customer to make repeat purchases.
  • customer premises equipment - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
  • customer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
  • Customer Proprietary Network Information - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
  • customer relationship analysis (CRA) - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer retention - Customer retention is a metric that measures customer loyalty, or the ability for an organization to keep its customers over time.
  • customer satisfaction - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets the customer's expectations.
  • customer satisfaction (CSAT) - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets the customer's expectations.
  • customer scoring models - A customer scoring model is a component of customer relationship management (CRM) programs that refers to various metrics used to help companies predict the long term financial value of customers.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer service charter - A customer service charter is a document that outlines how an organization promises to work with its customers along with providing insights into how an organization operates.
  • customer service chat (CSC) - In customer relationship management (CRM), customer service chat (CSC) is an Internet service that allows the user to communicate in real time with a customer service agent by using an instant messaging (IM) application that's built into the company's Web site.
  • customer success - Customer success is a strategy to assure that a company’s products are meeting the needs of the customer.
  • customer touch point - A customer touch point is any direct or indirect contact a customer has with a brand.
  • customer valuation - In customer relationship management (CRM), customer valuation is a scoring process used to help a company determine which customers the company should target in order to maximize profit.
  • customer-centric - Customer-centric is an approach to doing business that focuses on providing a positive customer experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • CUT - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
  • cut-and-paste attack - A cut-and-paste attack is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.
  • cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
  • cutting edge - Cutting edge is an adjective used to describe the newest, most advanced version of a product or service.
  • CVC - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
  • CVE - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • CVO - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • CVO (chief visionary officer) - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • CVS - CVS also is an abbreviation for Computer Vision Syndrome.
  • CVSS (Common Vulnerability Scoring System) - The CVSS (Common Vulnerability Scoring System) rates the severity of software vulnerabilities so organizations are able to prioritize mitigation.
  • CVV - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • CWDM - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
  • CWE - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • CWNP - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • cXML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • CxO - CxO is a short way to refer, collectively, to corporate executives at what is sometimes called the C-level, whose job titles typically start with "Chief" and end with "Officer.
  • cyan magenta yellow key - CMYK is a scheme for combining primary pigments.
  • cyan, magenta, yellow, and black pigment model - CMYK is a scheme for combining primary pigments.
  • cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
  • cyber attribution - Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
  • Cyber Intelligence Act - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Intelligence Sharing and Protection Act of 2011 - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Intelligence Sharing and Protection Act of 2011 (CISPA) - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Monday - Cyber Monday is a marketing event created to promote online sales.
  • cyber resilience - Cyber resilience is a concept that refers to the security that goes beyond defense and prevention to focus on response and resilience in moments of crisis.
  • Cyber Storm - Cyber Storm is the name of a simulated attack exercise conducted by the U.
  • cyber vigilantism - Cyber vigilantism is a rough approximation of law enforcement or an attempt at achieving justice or accomplishing something online through unauthorized channels.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybercommuting - Telecommuting and telework are synonyms for the use of telecommunication to work outside the traditional office or workplace, usually at home (SOHO) or in a mobile situation.
  • cybercrime - Cybercrime is any criminal activity that involves a computer, networked device or a network.
  • cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberextortionist - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberforensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • cyberheist - A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • Cyberoam - Cyberoam is a vendor for information security products and services.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • Cybersecurity Act - The Cybersecurity Enhancement Act of 2009 (S.
  • Cybersecurity and Infrastructure Security Agency (CISA) - Cybersecurity and Infrastructure Security Agency (CISA) is a division of the Department of Homeland Security (DHS) that is tasked with the defense of the infrastructure of the internet and the charge to design measures to improve the infrastructure’s resilience and security.
  • Cybersecurity Enhancement Act of 2009 - The Cybersecurity Enhancement Act of 2009 (S.
  • Cybersecurity Information Sharing Act (CISA) - Cybersecurity Information Sharing Act (CISA) is proposed legislation that will allow United States government agencies and non-government entities to share information with each other as they investigate cyberattacks.
  • cybersecurity insurance (cybersecurity liability insurance) - Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to help reduce the financial risks associated with doing business online.
  • cyberspace - Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
  • cybersquatting - Cybersquatting is registering, trafficking in, or using a domain name with bad-faith intent to profit from the goodwill of a trademark belonging to someone else.
  • cyberstalker - Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • cyberstalking - Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.
  • cyberterror - According to the U.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close